… this isn't the forums?

Unfortunately, the forums have been discontinued. All discussion has been moved to the comments section of our articles, so start clicking on the topics you're interested in to dive back into the conversation!
Features

Sony in 2019: Playing catch-up

by Oliver Cragg February 16, 20190 comments
Features

Honor View 20 camera review: A very high score, and for good reason

by Edgar Cervantes 23 hours ago0 comments
Reviews

Three months with the Huawei Mate 20 Pro: Still worth the money

by Hadlee Simons February 16, 20190 comments
News

Here’s our first look at the LG V50

by Bogdan Petrovan February 16, 20190 comments
2 articles

Google hopes Adiantum will bring encryption to budget smartphones

Adiantum could solve the issue of low-end hardware not supporting processor-heavy encryption.
by C. Scott BrownFebruary 7, 2019

Encrypt and secure your files with Kruptos 2 Pro — 67% off today

Kruptos 2 is the easy-to-use, military-grade encryption software that keeps your files secure across your devices.
by AA PicksJanuary 17, 2019

How easy is it to capture data on public free Wi-Fi? – Gary explains

You should always exercise caution when connecting to open Wi-Fi hotspots. But here is the question, just how easy is it to capture data on public free Wi-Fi?
by Gary SimsFebruary 14, 2018

How to encrypt your Android device

Your Android device is a pocket-size container of important information that you don't want to fall into the wrong hands. It is crucial to keep your Android data safe. In this post, ...
by Robert TriggsAugust 3, 2017
 
 

Google shatters SHA-1, but don’t worry: the Internet is still working

Google has shown that it can create two files with the same SHA-1 hashes, bad news for SHA-1 itself, but don't worry the Internet is still working.
by Gary SimsFebruary 24, 2017

Following Trump’s win, new users of encrypted email services double

Following the announcement of the election result, the world's largest encrypted email service provider has seen its new user sign-ups double.
by Kris CarlonNovember 12, 2016

Great, now Google’s AI is coming up with its own encryption methods

Google Brain researchers have confirmed that AI neural networks have successfully created an encryption method even another AI cannot decrypt.
by Kris CarlonOctober 28, 2016

Express VPN review

It seems to me that a week can't go by without there being some revelation or other connected with privacy. The solution is to use a VPN! Here is my full review of Express VPN.
by Gary SimsOctober 21, 2016

How does public key cryptography work? – Gary explains

How keys are distributed is vital to any encryption system. Find out how to do it with the Diffie–Hellman key exchange and using public-key cryptography.
by Gary SimsOctober 4, 2016

How does encryption work? – Gary explains

You probably use some form of encryption almost every day, and you probably don't even think about it. But what is it and how does it work?
by Gary SimsSeptember 13, 2016
Load More
End of the line!